Exam 1: Introduction to Information Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -Enables authorized users to access information without interference or obstruction, and to receive it in the required format.

Free
(Short Answer)
4.9/5
(32)
Correct Answer:
Verified

C

Organizations must minimize ____ to match their risk appetite.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

By balancing information security and access, a completely secure information system can be created.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -People responsible for the security and use of a particular set of information.

(Short Answer)
4.8/5
(27)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -End users who work with the information to perform their daily jobs supporting the mission of the organization, and who therefore share the responsibility for data security.

(Short Answer)
4.9/5
(41)

A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle.

(Multiple Choice)
4.8/5
(24)

An enterprise information security policy (EISP) is also known as a(n) ____.

(Multiple Choice)
4.8/5
(35)

Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency?

(Multiple Choice)
4.7/5
(27)

Define social engineering and briefly describe how it is accomplished.

(Essay)
5.0/5
(33)

When organizations record versions of their policy in English and alternate languages, they are attempting to meet the ____ criteria to make the policy effective and legally enforceable.

(Multiple Choice)
4.8/5
(39)

Implementing multiple types of technology and thereby preventing the failure of one system from compromising the security of information is referred to as ____________________.

(Short Answer)
4.8/5
(39)

____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages whose IP addresses indicate to the recipient that the messages are coming from a trusted host.

(Short Answer)
4.9/5
(30)

List the four important organizational functions an information security program performs.

(Essay)
4.9/5
(28)

Which term describes a subject or object's ability to use, manipulate, modify, or affect another subject or object?

(Multiple Choice)
4.9/5
(31)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -The protection of information from disclosure or exposure to unauthorized individuals or systems.

(Short Answer)
4.8/5
(28)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -A term meaning information remains whole, complete, and uncorrupted.

(Short Answer)
4.7/5
(42)

How does a distributed denial-of-service (DDoS) attack work and why are they so dangerous?

(Essay)
4.8/5
(34)

Match each item with a statement below. a.Accuracy f.Data users b.Authenticity g.Integrity c.Availability h.Utility d.Confidentiality i.Data custodians e.Data owners -A term referring to the quality or state of being genuine or original rather than a reproduction or fabrication.

(Short Answer)
4.9/5
(35)

The CIA triad is based on three characteristics of information that form the foundation for many security programs: ____.

(Multiple Choice)
4.8/5
(43)

Describe the purpose of the Security Area Working Group and RFC 2196.

(Essay)
4.9/5
(39)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)